aws-sdk-eks 1.158.0 → 1.159.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-eks/client.rb +45 -1
- data/lib/aws-sdk-eks/client_api.rb +3 -0
- data/lib/aws-sdk-eks/types.rb +56 -3
- data/lib/aws-sdk-eks.rb +1 -1
- data/sig/client.rbs +4 -2
- data/sig/types.rbs +3 -0
- metadata +1 -1
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 8e734c8b87223ad327b6cff86b52567ca43d1fbf3221789b9f6e4b7497c23ec6
|
|
4
|
+
data.tar.gz: f650ff968a4b8a101fbc5e3cb22445db2585604ab2df5b52e4c782dd05b95e54
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 998fe97748cfe592ba32c7dd13a90d289eb8c061b23c870fe54f53cc13f78f2ad8ac60366126665dd5705e6092dc80ed357bf176e3a4b51ee010506de5b5cd50
|
|
7
|
+
data.tar.gz: a0f4df52ef6a6139fe5c58bc9edcfe55c43ec83e304d842bcdc0f1370f0913d5884f9f91d0f4a617c293ce93536297fef1634a721882191e1d51cf5fc5f76eb6
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,11 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.159.0 (2026-02-10)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - Introducing an optional policy field, an IAM policy applied to pod identity associations in addition to IAM role policies. When specified, pod permissions are the intersection of IAM role policies and the policy field, ensuring the principle of least privilege.
|
|
8
|
+
|
|
4
9
|
1.158.0 (2026-02-09)
|
|
5
10
|
------------------
|
|
6
11
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.159.0
|
data/lib/aws-sdk-eks/client.rb
CHANGED
|
@@ -2332,6 +2332,25 @@ module Aws::EKS
|
|
|
2332
2332
|
# allowing your Pods to securely access resources like S3 buckets in the
|
|
2333
2333
|
# target account.
|
|
2334
2334
|
#
|
|
2335
|
+
# @option params [String] :policy
|
|
2336
|
+
# An optional IAM policy in JSON format (as an escaped string) that
|
|
2337
|
+
# applies additional restrictions to this pod identity association
|
|
2338
|
+
# beyond the IAM policies attached to the IAM role. This policy is
|
|
2339
|
+
# applied as the intersection of the role's policies and this policy,
|
|
2340
|
+
# allowing you to reduce the permissions that applications in the pods
|
|
2341
|
+
# can use. Use this policy to enforce least privilege access while still
|
|
2342
|
+
# leveraging a shared IAM role across multiple applications.
|
|
2343
|
+
#
|
|
2344
|
+
# **Important considerations**
|
|
2345
|
+
#
|
|
2346
|
+
# * **Session tags:** When using this policy, `disableSessionTags` must
|
|
2347
|
+
# be set to `true`.
|
|
2348
|
+
#
|
|
2349
|
+
# * **Target role permissions:** If you specify both a `TargetRoleArn`
|
|
2350
|
+
# and a policy, the policy restrictions apply only to the target
|
|
2351
|
+
# role's permissions, not to the initial role used for assuming the
|
|
2352
|
+
# target role.
|
|
2353
|
+
#
|
|
2335
2354
|
# @return [Types::CreatePodIdentityAssociationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
|
2336
2355
|
#
|
|
2337
2356
|
# * {Types::CreatePodIdentityAssociationResponse#association #association} => Types::PodIdentityAssociation
|
|
@@ -2349,6 +2368,7 @@ module Aws::EKS
|
|
|
2349
2368
|
# },
|
|
2350
2369
|
# disable_session_tags: false,
|
|
2351
2370
|
# target_role_arn: "String",
|
|
2371
|
+
# policy: "String",
|
|
2352
2372
|
# })
|
|
2353
2373
|
#
|
|
2354
2374
|
# @example Response structure
|
|
@@ -2367,6 +2387,7 @@ module Aws::EKS
|
|
|
2367
2387
|
# resp.association.disable_session_tags #=> Boolean
|
|
2368
2388
|
# resp.association.target_role_arn #=> String
|
|
2369
2389
|
# resp.association.external_id #=> String
|
|
2390
|
+
# resp.association.policy #=> String
|
|
2370
2391
|
#
|
|
2371
2392
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/CreatePodIdentityAssociation AWS API Documentation
|
|
2372
2393
|
#
|
|
@@ -2900,6 +2921,7 @@ module Aws::EKS
|
|
|
2900
2921
|
# resp.association.disable_session_tags #=> Boolean
|
|
2901
2922
|
# resp.association.target_role_arn #=> String
|
|
2902
2923
|
# resp.association.external_id #=> String
|
|
2924
|
+
# resp.association.policy #=> String
|
|
2903
2925
|
#
|
|
2904
2926
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/DeletePodIdentityAssociation AWS API Documentation
|
|
2905
2927
|
#
|
|
@@ -3932,6 +3954,7 @@ module Aws::EKS
|
|
|
3932
3954
|
# resp.association.disable_session_tags #=> Boolean
|
|
3933
3955
|
# resp.association.target_role_arn #=> String
|
|
3934
3956
|
# resp.association.external_id #=> String
|
|
3957
|
+
# resp.association.policy #=> String
|
|
3935
3958
|
#
|
|
3936
3959
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/DescribePodIdentityAssociation AWS API Documentation
|
|
3937
3960
|
#
|
|
@@ -6296,6 +6319,25 @@ module Aws::EKS
|
|
|
6296
6319
|
# allowing your Pods to securely access resources like S3 buckets in the
|
|
6297
6320
|
# target account.
|
|
6298
6321
|
#
|
|
6322
|
+
# @option params [String] :policy
|
|
6323
|
+
# An optional IAM policy in JSON format (as an escaped string) that
|
|
6324
|
+
# applies additional restrictions to this pod identity association
|
|
6325
|
+
# beyond the IAM policies attached to the IAM role. This policy is
|
|
6326
|
+
# applied as the intersection of the role's policies and this policy,
|
|
6327
|
+
# allowing you to reduce the permissions that applications in the pods
|
|
6328
|
+
# can use. Use this policy to enforce least privilege access while still
|
|
6329
|
+
# leveraging a shared IAM role across multiple applications.
|
|
6330
|
+
#
|
|
6331
|
+
# **Important considerations**
|
|
6332
|
+
#
|
|
6333
|
+
# * **Session tags:** When using this policy, `disableSessionTags` must
|
|
6334
|
+
# be set to `true`.
|
|
6335
|
+
#
|
|
6336
|
+
# * **Target role permissions:** If you specify both a `TargetRoleArn`
|
|
6337
|
+
# and a policy, the policy restrictions apply only to the target
|
|
6338
|
+
# role's permissions, not to the initial role used for assuming the
|
|
6339
|
+
# target role.
|
|
6340
|
+
#
|
|
6299
6341
|
# @return [Types::UpdatePodIdentityAssociationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
|
6300
6342
|
#
|
|
6301
6343
|
# * {Types::UpdatePodIdentityAssociationResponse#association #association} => Types::PodIdentityAssociation
|
|
@@ -6309,6 +6351,7 @@ module Aws::EKS
|
|
|
6309
6351
|
# client_request_token: "String",
|
|
6310
6352
|
# disable_session_tags: false,
|
|
6311
6353
|
# target_role_arn: "String",
|
|
6354
|
+
# policy: "String",
|
|
6312
6355
|
# })
|
|
6313
6356
|
#
|
|
6314
6357
|
# @example Response structure
|
|
@@ -6327,6 +6370,7 @@ module Aws::EKS
|
|
|
6327
6370
|
# resp.association.disable_session_tags #=> Boolean
|
|
6328
6371
|
# resp.association.target_role_arn #=> String
|
|
6329
6372
|
# resp.association.external_id #=> String
|
|
6373
|
+
# resp.association.policy #=> String
|
|
6330
6374
|
#
|
|
6331
6375
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/UpdatePodIdentityAssociation AWS API Documentation
|
|
6332
6376
|
#
|
|
@@ -6355,7 +6399,7 @@ module Aws::EKS
|
|
|
6355
6399
|
tracer: tracer
|
|
6356
6400
|
)
|
|
6357
6401
|
context[:gem_name] = 'aws-sdk-eks'
|
|
6358
|
-
context[:gem_version] = '1.
|
|
6402
|
+
context[:gem_version] = '1.159.0'
|
|
6359
6403
|
Seahorse::Client::Request.new(handlers, context)
|
|
6360
6404
|
end
|
|
6361
6405
|
|
|
@@ -854,6 +854,7 @@ module Aws::EKS
|
|
|
854
854
|
CreatePodIdentityAssociationRequest.add_member(:tags, Shapes::ShapeRef.new(shape: TagMap, location_name: "tags"))
|
|
855
855
|
CreatePodIdentityAssociationRequest.add_member(:disable_session_tags, Shapes::ShapeRef.new(shape: BoxedBoolean, location_name: "disableSessionTags"))
|
|
856
856
|
CreatePodIdentityAssociationRequest.add_member(:target_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "targetRoleArn"))
|
|
857
|
+
CreatePodIdentityAssociationRequest.add_member(:policy, Shapes::ShapeRef.new(shape: String, location_name: "policy"))
|
|
857
858
|
CreatePodIdentityAssociationRequest.struct_class = Types::CreatePodIdentityAssociationRequest
|
|
858
859
|
|
|
859
860
|
CreatePodIdentityAssociationResponse.add_member(:association, Shapes::ShapeRef.new(shape: PodIdentityAssociation, location_name: "association"))
|
|
@@ -1506,6 +1507,7 @@ module Aws::EKS
|
|
|
1506
1507
|
PodIdentityAssociation.add_member(:disable_session_tags, Shapes::ShapeRef.new(shape: BoxedBoolean, location_name: "disableSessionTags"))
|
|
1507
1508
|
PodIdentityAssociation.add_member(:target_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "targetRoleArn"))
|
|
1508
1509
|
PodIdentityAssociation.add_member(:external_id, Shapes::ShapeRef.new(shape: String, location_name: "externalId"))
|
|
1510
|
+
PodIdentityAssociation.add_member(:policy, Shapes::ShapeRef.new(shape: String, location_name: "policy"))
|
|
1509
1511
|
PodIdentityAssociation.struct_class = Types::PodIdentityAssociation
|
|
1510
1512
|
|
|
1511
1513
|
PodIdentityAssociationSummaries.member = Shapes::ShapeRef.new(shape: PodIdentityAssociationSummary)
|
|
@@ -1766,6 +1768,7 @@ module Aws::EKS
|
|
|
1766
1768
|
UpdatePodIdentityAssociationRequest.add_member(:client_request_token, Shapes::ShapeRef.new(shape: String, location_name: "clientRequestToken", metadata: {"idempotencyToken" => true}))
|
|
1767
1769
|
UpdatePodIdentityAssociationRequest.add_member(:disable_session_tags, Shapes::ShapeRef.new(shape: BoxedBoolean, location_name: "disableSessionTags"))
|
|
1768
1770
|
UpdatePodIdentityAssociationRequest.add_member(:target_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "targetRoleArn"))
|
|
1771
|
+
UpdatePodIdentityAssociationRequest.add_member(:policy, Shapes::ShapeRef.new(shape: String, location_name: "policy"))
|
|
1769
1772
|
UpdatePodIdentityAssociationRequest.struct_class = Types::UpdatePodIdentityAssociationRequest
|
|
1770
1773
|
|
|
1771
1774
|
UpdatePodIdentityAssociationResponse.add_member(:association, Shapes::ShapeRef.new(shape: PodIdentityAssociation, location_name: "association"))
|
data/lib/aws-sdk-eks/types.rb
CHANGED
|
@@ -2945,6 +2945,26 @@ module Aws::EKS
|
|
|
2945
2945
|
# like S3 buckets in the target account.
|
|
2946
2946
|
# @return [String]
|
|
2947
2947
|
#
|
|
2948
|
+
# @!attribute [rw] policy
|
|
2949
|
+
# An optional IAM policy in JSON format (as an escaped string) that
|
|
2950
|
+
# applies additional restrictions to this pod identity association
|
|
2951
|
+
# beyond the IAM policies attached to the IAM role. This policy is
|
|
2952
|
+
# applied as the intersection of the role's policies and this policy,
|
|
2953
|
+
# allowing you to reduce the permissions that applications in the pods
|
|
2954
|
+
# can use. Use this policy to enforce least privilege access while
|
|
2955
|
+
# still leveraging a shared IAM role across multiple applications.
|
|
2956
|
+
#
|
|
2957
|
+
# **Important considerations**
|
|
2958
|
+
#
|
|
2959
|
+
# * **Session tags:** When using this policy, `disableSessionTags`
|
|
2960
|
+
# must be set to `true`.
|
|
2961
|
+
#
|
|
2962
|
+
# * **Target role permissions:** If you specify both a `TargetRoleArn`
|
|
2963
|
+
# and a policy, the policy restrictions apply only to the target
|
|
2964
|
+
# role's permissions, not to the initial role used for assuming the
|
|
2965
|
+
# target role.
|
|
2966
|
+
# @return [String]
|
|
2967
|
+
#
|
|
2948
2968
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/CreatePodIdentityAssociationRequest AWS API Documentation
|
|
2949
2969
|
#
|
|
2950
2970
|
class CreatePodIdentityAssociationRequest < Struct.new(
|
|
@@ -2955,7 +2975,8 @@ module Aws::EKS
|
|
|
2955
2975
|
:client_request_token,
|
|
2956
2976
|
:tags,
|
|
2957
2977
|
:disable_session_tags,
|
|
2958
|
-
:target_role_arn
|
|
2978
|
+
:target_role_arn,
|
|
2979
|
+
:policy)
|
|
2959
2980
|
SENSITIVE = []
|
|
2960
2981
|
include Aws::Structure
|
|
2961
2982
|
end
|
|
@@ -6745,6 +6766,16 @@ module Aws::EKS
|
|
|
6745
6766
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/confused-deputy.html
|
|
6746
6767
|
# @return [String]
|
|
6747
6768
|
#
|
|
6769
|
+
# @!attribute [rw] policy
|
|
6770
|
+
# An optional IAM policy in JSON format (as an escaped string) that
|
|
6771
|
+
# applies additional restrictions to this pod identity association
|
|
6772
|
+
# beyond the IAM policies attached to the IAM role. This policy is
|
|
6773
|
+
# applied as the intersection of the role's policies and this policy,
|
|
6774
|
+
# allowing you to reduce the permissions that applications in the pods
|
|
6775
|
+
# can use. Use this policy to enforce least privilege access while
|
|
6776
|
+
# still leveraging a shared IAM role across multiple applications.
|
|
6777
|
+
# @return [String]
|
|
6778
|
+
#
|
|
6748
6779
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/PodIdentityAssociation AWS API Documentation
|
|
6749
6780
|
#
|
|
6750
6781
|
class PodIdentityAssociation < Struct.new(
|
|
@@ -6760,7 +6791,8 @@ module Aws::EKS
|
|
|
6760
6791
|
:owner_arn,
|
|
6761
6792
|
:disable_session_tags,
|
|
6762
6793
|
:target_role_arn,
|
|
6763
|
-
:external_id
|
|
6794
|
+
:external_id,
|
|
6795
|
+
:policy)
|
|
6764
6796
|
SENSITIVE = []
|
|
6765
6797
|
include Aws::Structure
|
|
6766
6798
|
end
|
|
@@ -8379,6 +8411,26 @@ module Aws::EKS
|
|
|
8379
8411
|
# like S3 buckets in the target account.
|
|
8380
8412
|
# @return [String]
|
|
8381
8413
|
#
|
|
8414
|
+
# @!attribute [rw] policy
|
|
8415
|
+
# An optional IAM policy in JSON format (as an escaped string) that
|
|
8416
|
+
# applies additional restrictions to this pod identity association
|
|
8417
|
+
# beyond the IAM policies attached to the IAM role. This policy is
|
|
8418
|
+
# applied as the intersection of the role's policies and this policy,
|
|
8419
|
+
# allowing you to reduce the permissions that applications in the pods
|
|
8420
|
+
# can use. Use this policy to enforce least privilege access while
|
|
8421
|
+
# still leveraging a shared IAM role across multiple applications.
|
|
8422
|
+
#
|
|
8423
|
+
# **Important considerations**
|
|
8424
|
+
#
|
|
8425
|
+
# * **Session tags:** When using this policy, `disableSessionTags`
|
|
8426
|
+
# must be set to `true`.
|
|
8427
|
+
#
|
|
8428
|
+
# * **Target role permissions:** If you specify both a `TargetRoleArn`
|
|
8429
|
+
# and a policy, the policy restrictions apply only to the target
|
|
8430
|
+
# role's permissions, not to the initial role used for assuming the
|
|
8431
|
+
# target role.
|
|
8432
|
+
# @return [String]
|
|
8433
|
+
#
|
|
8382
8434
|
# @see http://docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/UpdatePodIdentityAssociationRequest AWS API Documentation
|
|
8383
8435
|
#
|
|
8384
8436
|
class UpdatePodIdentityAssociationRequest < Struct.new(
|
|
@@ -8387,7 +8439,8 @@ module Aws::EKS
|
|
|
8387
8439
|
:role_arn,
|
|
8388
8440
|
:client_request_token,
|
|
8389
8441
|
:disable_session_tags,
|
|
8390
|
-
:target_role_arn
|
|
8442
|
+
:target_role_arn,
|
|
8443
|
+
:policy)
|
|
8391
8444
|
SENSITIVE = []
|
|
8392
8445
|
include Aws::Structure
|
|
8393
8446
|
end
|
data/lib/aws-sdk-eks.rb
CHANGED
data/sig/client.rbs
CHANGED
|
@@ -423,7 +423,8 @@ module Aws
|
|
|
423
423
|
?client_request_token: ::String,
|
|
424
424
|
?tags: Hash[::String, ::String],
|
|
425
425
|
?disable_session_tags: bool,
|
|
426
|
-
?target_role_arn: ::String
|
|
426
|
+
?target_role_arn: ::String,
|
|
427
|
+
?policy: ::String
|
|
427
428
|
) -> _CreatePodIdentityAssociationResponseSuccess
|
|
428
429
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreatePodIdentityAssociationResponseSuccess
|
|
429
430
|
|
|
@@ -1237,7 +1238,8 @@ module Aws
|
|
|
1237
1238
|
?role_arn: ::String,
|
|
1238
1239
|
?client_request_token: ::String,
|
|
1239
1240
|
?disable_session_tags: bool,
|
|
1240
|
-
?target_role_arn: ::String
|
|
1241
|
+
?target_role_arn: ::String,
|
|
1242
|
+
?policy: ::String
|
|
1241
1243
|
) -> _UpdatePodIdentityAssociationResponseSuccess
|
|
1242
1244
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdatePodIdentityAssociationResponseSuccess
|
|
1243
1245
|
|
data/sig/types.rbs
CHANGED
|
@@ -569,6 +569,7 @@ module Aws::EKS
|
|
|
569
569
|
attr_accessor tags: ::Hash[::String, ::String]
|
|
570
570
|
attr_accessor disable_session_tags: bool
|
|
571
571
|
attr_accessor target_role_arn: ::String
|
|
572
|
+
attr_accessor policy: ::String
|
|
572
573
|
SENSITIVE: []
|
|
573
574
|
end
|
|
574
575
|
|
|
@@ -1432,6 +1433,7 @@ module Aws::EKS
|
|
|
1432
1433
|
attr_accessor disable_session_tags: bool
|
|
1433
1434
|
attr_accessor target_role_arn: ::String
|
|
1434
1435
|
attr_accessor external_id: ::String
|
|
1436
|
+
attr_accessor policy: ::String
|
|
1435
1437
|
SENSITIVE: []
|
|
1436
1438
|
end
|
|
1437
1439
|
|
|
@@ -1773,6 +1775,7 @@ module Aws::EKS
|
|
|
1773
1775
|
attr_accessor client_request_token: ::String
|
|
1774
1776
|
attr_accessor disable_session_tags: bool
|
|
1775
1777
|
attr_accessor target_role_arn: ::String
|
|
1778
|
+
attr_accessor policy: ::String
|
|
1776
1779
|
SENSITIVE: []
|
|
1777
1780
|
end
|
|
1778
1781
|
|